You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Exporting IntuneEndpointDetectionAndResponsePolicyWindows10 resources from one tenant and then creating them on a target tenant (while keeping Identity with the GUID of the source) tenant, works without issues just as updating does as well. However deleting the policy (Ensure = Absent) then fails with a Graph API issue, this is because it tries to delete the policy with the original Identity in the MOF from the source tenant instead of using the one from the target.
This was another problem I found out using my custom Test Harness pipeline.
VERBOSE: [REDACTED]: [[IntuneEndpointDetectionAndResponsePolicyWindows10]IntuneEndpointDetectionAndResponsePolicyWindows10-IntuneEndpointDetectionAndResponsePolicyWindows10_1] No
Endpoint Detection And Response Policy with Id {c9a97b40-05d5-41d0-9295-fea90403ead2} was found
VERBOSE: [REDACTED]: [[IntuneEndpointDetectionAndResponsePolicyWindows10]IntuneEndpointDetectionAndResponsePolicyWindows10-IntuneEndpointDetectionAndResponsePolicyWindows10_1]
Found Endpoint Detection And Response Policy with Id {9d5ba35b-a329-4e2d-aafd-53ccdef4a953} and displayName {IntuneEndpointDetectionAndResponsePolicyWindows10_1}
VERBOSE: [REDACTED]: [[IntuneEndpointDetectionAndResponsePolicyWindows10]IntuneEndpointDetectionAndResponsePolicyWindows10-IntuneEndpointDetectionAndResponsePolicyWindows10_1]
Found Endpoint Protection Policy {IntuneEndpointDetectionAndResponsePolicyWindows10_1}
VERBOSE: [REDACTED]: [[IntuneEndpointDetectionAndResponsePolicyWindows10]IntuneEndpointDetectionAndResponsePolicyWindows10-IntuneEndpointDetectionAndResponsePolicyWindows10_1]
Removing Endpoint Protection Policy {IntuneEndpointDetectionAndResponsePolicyWindows10_1}
[ResourceNotFound] : {
"_version": 3,"Message": "An error has occurred - Operation ID (for customer support): 00000000-0000-0000-0000-000000000000 - Activity ID: e4149828-f673-4325-a94b-04a5a0c5682c - Url: https://fef.msub07.manage.microsoft.com/DeviceConfigV2/DCV2GraphService/de147310-ffff-8765-1108-121303070746/deviceManagement/configurationPolicies('c9a97b40-05d5-41d0-9295-fea90403ead2')?api-version=5023-08-14","CustomApiErrorPhrase": "","RetryAfter": null,"ErrorSourceService": "","HttpHeaders": "{}"
}
+ CategoryInfo : InvalidOperation: ({ DeviceManagem...2, IfMatch = }:) [], CimException
+ FullyQualifiedErrorId : ResourceNotFound,Microsoft.Graph.Beta.PowerShell.Cmdlets.RemoveMgBetaDeviceManagementConfigurationPolicy_Delete
+ PSComputerName : localhost
VERBOSE: [REDACTED]: LCM: [ EndSet ] [[IntuneEndpointDetectionAndResponsePolicyWindows10]IntuneEndpointDetectionAndResponsePolicyWindows10-IntuneEndpointDetectionAndResponsePolicyWindows10_1] in2.5200 seconds.
The PowerShell DSC resource '[IntuneEndpointDetectionAndResponsePolicyWindows10]IntuneEndpointDetectionAndResponsePolicyWindows10-IntuneEndpointDetectionAndResponsePolicyWindows10_1' with SourceInfo
'C:\temp\dsc\IntuneEndpointDetectionAndResponsePolicyWindows10.ps1::34::9::IntuneEndpointDetectionAndResponsePolicyWindows10' threw one or more non-terminating errors while running the Set-TargetResource
functionality. These errors are logged to the ETW channel called Microsoft-Windows-DSC/Operational. Refer to this channel for more details.
+ CategoryInfo : InvalidOperation: (:) [], CimException
+ FullyQualifiedErrorId : NonTerminatingErrorFromProvider
+ PSComputerName : localhost
VERBOSE: [REDACTED]: LCM: [ EndSet ]
The SendConfigurationApply function did not succeed.
+ CategoryInfo : NotSpecified: (root/Microsoft/...gurationManager:String) [], CimException
+ FullyQualifiedErrorId : MI RESULT 1+ PSComputerName : localhost
VERBOSE: Operation 'Invoke CimMethod' complete.
VERBOSE: Time taken for configuration job to complete is 89.816 seconds
Description of the issue
Exporting IntuneEndpointDetectionAndResponsePolicyWindows10 resources from one tenant and then creating them on a target tenant (while keeping Identity with the GUID of the source) tenant, works without issues just as updating does as well. However deleting the policy (Ensure = Absent) then fails with a Graph API issue, this is because it tries to delete the policy with the original Identity in the MOF from the source tenant instead of using the one from the target.
This was another problem I found out using my custom Test Harness pipeline.
Microsoft 365 DSC Version
1.23.1213.1
Which workloads are affected
other
The DSC configuration
Verbose logs showing the problem
Environment Information + PowerShell Version
The text was updated successfully, but these errors were encountered: